The use of a broken or risky cryptographic algorithm was discovered in firmware version 3.60 of the Click Plus PLC. The vulnerability relies on the fact that the software uses an insecure implementation of the RSA encryption algorithm.
Metrics
Affected Vendors & Products
References
History
Thu, 25 Sep 2025 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Automationdirect
Automationdirect click Plus |
|
Vendors & Products |
Automationdirect
Automationdirect click Plus |
Wed, 24 Sep 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 23 Sep 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The use of a broken or risky cryptographic algorithm was discovered in firmware version 3.60 of the Click Plus PLC. The vulnerability relies on the fact that the software uses an insecure implementation of the RSA encryption algorithm. | |
Title | AutomationDirect CLICK PLUS Use of a Broken or Risky Cryptographic Algorithm | |
Weaknesses | CWE-327 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: icscert
Published: 2025-09-23T22:08:40.744Z
Updated: 2025-09-24T14:08:07.973Z
Reserved: 2025-09-16T20:09:26.619Z
Link: CVE-2025-59484

Updated: 2025-09-24T14:08:05.323Z

Status : Awaiting Analysis
Published: 2025-09-23T22:15:34.360
Modified: 2025-09-24T18:11:24.520
Link: CVE-2025-59484

No data.